turbot/gcp_compliance

Control: Ensure default Service account is not used for Project access in Kubernetes Engine clusters

Usage

Run the control in your terminal:

powerpipe control run gcp_compliance.control.disable_gke_default_service_account

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run gcp_compliance.control.disable_gke_default_service_account --share

SQL

This control uses a named query:

kubernetes_cluster_service_account_default

Tags